paulscIdeas for Melodic Interval TrainingHere are some random ideas that came from doing daily melodic interval ear training over the past 8 weeks. I haven’t found those mentioned…Nov 28, 2023Nov 28, 2023
paulscHacking Google EP05CH01: 2BPPThis challenge has a single binary payload. All our efforts to find a data format with the usual tools are in vain, file, binwalk, trid…Oct 19, 2022Oct 19, 2022
paulscHacking Google EP04CH3: git hooksIn the third challenge of this series, we are still working with the same web app, and told to find a way to contribute. While poking…Oct 19, 2022Oct 19, 2022
paulscHacking Google EP04CH02: notSoSafeEqual()In this challenge, we are given the source code of the site from the previous challenge for analysis. The hint is that we should log in as…Oct 19, 2022Oct 19, 2022
paulscHacking Google EP04CH01: tar path traversalIn the first challenge of this episode, we are instructed to look for data import and export endpoints.Oct 19, 2022Oct 19, 2022
paulscHacking Google EP03CH3: It’s Corgis all the way downIn this episode the payload is a zip archive containing a QR Code in PNG format, and a challenge.apk Android app. When we try running this…Oct 18, 2022Oct 18, 2022
paulscHacking Google EP03CH2: Shell SprinterWe connect to the server, are faced by a banner, a gripping intro story, and then we are dropped into a Pacman-style ascii-art based game…Oct 18, 2022Oct 18, 2022
paulscHacking Google EP03CH01: gcloudLet’s get started on challenge 1 of the third episode of the Hacking Google CTF. No link is provided to us here, just the following text.Oct 18, 2022Oct 18, 2022
paulscHacking Google EP02CH03: QuarantineShellThis challenge has you connecting to a server to find an extremely restrictive shell where none of the commands seem to work.Oct 17, 2022Oct 17, 2022